skip to content
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings Preview this item
ClosePreview this item
Checking...

Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings

Author: Sihan Qing; Tatsuaki Okamoto; Jianying Zhou
Publisher: Berlin ; New York : Springer, ©2001.
Series: Lecture notes in computer science, 2229.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the Third International Conference on Information and Communications Security, ICICS 2001, held in Xian, China in November 2001. The 56 revised full papers presented were carefully reviewed and selected from a total of 134 submissions. The complete spectrum of information and communications security is covered including theoretical foundations, secret sharing,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Print version:International Conference on Information and Communications Security (3rd : 2001 : Xian, Shaanxi Sheng, China)
Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
(OCoLC)48449699
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Sihan Qing; Tatsuaki Okamoto; Jianying Zhou
ISBN: 9783540456001 3540456007
OCLC Number: 166464608
Description: 1 online resource (xiv, 504 pages) : illustrations.
Contents: Security of Blind Discrete Log Signatures against Interactive Attacks --
An Intelligent Intruder Model for Security Protocol Analysis --
Primitive Polynomials over GF(2) --
A Cryptologic Approach --
Unconditionally-Secure Oblivious Transfer --
Cryptanalysis of the Improved User Efficient Blind Signatures --
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret --
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain --
A Cyclic Window Algorithm for ECC Defined over Extension Fields --
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves --
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes --
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce --
A New Approach for Secure Multicast Routing in a Large Scale Network --
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems --
Dealing with Uncertainties in Risk Analysis Using Belief Functions --
RBAC for XML Document Stores --
Cheating Immune Secret Sharing --
Encryption Sticks (Randomats) --
Applying NCP Logic to the Analysis of SSL 3.0 --
Performance of WTLS and Its Impact on an M-commerce Transaction --
Enforcing Obligation with Security Monitors --
Efficient Software Implementation for Finite Field Multiplication in Normal Basis --
Playing Lottery on the Internet --
Privacy Protection for Transactions of Digital Goods --
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions --
Threshold Undeniable RSA Signature Scheme --
Two Simple Batch Verifying Multiple Digital Signatures --
Square Attack on Reduced Camellia Cipher --
Generalization of Elliptic Curve Digital Signature Schemes --
Reasoning about Accountability within Delegation --
A Novel Data Hiding Method for Two-Color Images --
An Identification Scheme Provably Secure against Reset Attack --
Estimating the Scalability of the Internet Key Exchange --
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes --
Defeating Denial-of-Service Attacks on the Internet --
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications --
A Unified Methodology for Verification and Synthesis of Firewall Configurations --
Quantifying Network Denial of Service: A Location Service Case Study --
A Public Key Cryptosystem Based on the Subgroup Membership Problem --
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network --
NIDS Research Based on Artificial Immunology --
AMBAR Protocol: Access Management Based on Authorization Reduction --
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication --
Dispatching Mobile Agents with Secure Routes in Parallel --
TH-SMS: Security Management System in Advanced Computational Infrastructure --
Cryptography and Middleware Security --
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes --
A Role-Based Model for Access Control in Database Federations --
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls --
A Digital Nominative Proxy Signature Scheme for Mobile Communication --
Hierarchical Simulation Model with Animation for Large Network Security --
Fair Electronic Cash Based on a Group Signature Scheme --
Fair Exchange of Digital Signatures with Offline Trusted Third Party --
SECUSIM: A Tool for the Cyber-Attack Simulation --
A New Semantics of Authentication Logic --
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles --
Redundancy, Obscurity, Self-Containment & Independence.
Series Title: Lecture notes in computer science, 2229.
Responsibility: Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.).

Abstract:

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi'an, China, 13-16 November 2001.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/166464608> # Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "166464608" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/895232546#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/telecommunication_systems_security_measures> ; # Telecommunication systems--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/895232546#Topic/computer_security> ; # Computer security
    schema:about <http://dewey.info/class/005.8/e21/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.worldcat.org/fast/1146074> ; # Telecommunication systems--Security measures
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/50279185> ; # Jianying Zhou
    schema:contributor <http://viaf.org/viaf/45204193> ; # Sihan Qing
    schema:contributor <http://viaf.org/viaf/18403173> ; # Tatsuaki Okamoto
    schema:copyrightYear "2001" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/895232546#Meeting/icics_conference_3rd_2001_xian_shaanxi_sheng_china> ; # ICICS (Conference) (3rd : 2001 : Xian, Shaanxi Sheng, China)
    schema:datePublished "2001" ;
    schema:description "Security of Blind Discrete Log Signatures against Interactive Attacks -- An Intelligent Intruder Model for Security Protocol Analysis -- Primitive Polynomials over GF(2) -- A Cryptologic Approach -- Unconditionally-Secure Oblivious Transfer -- Cryptanalysis of the Improved User Efficient Blind Signatures -- Towards the Forgery of a Group Signature without Knowing the Group Center's Secret -- Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain -- A Cyclic Window Algorithm for ECC Defined over Extension Fields -- Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves -- Attacks on Two Digital Signature Schemes Based on Error Correcting Codes -- A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce -- A New Approach for Secure Multicast Routing in a Large Scale Network -- A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems -- Dealing with Uncertainties in Risk Analysis Using Belief Functions -- RBAC for XML Document Stores -- Cheating Immune Secret Sharing -- Encryption Sticks (Randomats) -- Applying NCP Logic to the Analysis of SSL 3.0 -- Performance of WTLS and Its Impact on an M-commerce Transaction -- Enforcing Obligation with Security Monitors -- Efficient Software Implementation for Finite Field Multiplication in Normal Basis -- Playing Lottery on the Internet -- Privacy Protection for Transactions of Digital Goods -- Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions -- Threshold Undeniable RSA Signature Scheme -- Two Simple Batch Verifying Multiple Digital Signatures -- Square Attack on Reduced Camellia Cipher -- Generalization of Elliptic Curve Digital Signature Schemes -- Reasoning about Accountability within Delegation -- A Novel Data Hiding Method for Two-Color Images -- An Identification Scheme Provably Secure against Reset Attack -- Estimating the Scalability of the Internet Key Exchange -- An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes -- Defeating Denial-of-Service Attacks on the Internet -- A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications -- A Unified Methodology for Verification and Synthesis of Firewall Configurations -- Quantifying Network Denial of Service: A Location Service Case Study -- A Public Key Cryptosystem Based on the Subgroup Membership Problem -- On a Network Security Model for the Secure Information Flow on Multilevel Secure Network -- NIDS Research Based on Artificial Immunology -- AMBAR Protocol: Access Management Based on Authorization Reduction -- Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication -- Dispatching Mobile Agents with Secure Routes in Parallel -- TH-SMS: Security Management System in Advanced Computational Infrastructure -- Cryptography and Middleware Security -- Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes -- A Role-Based Model for Access Control in Database Federations -- A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls -- A Digital Nominative Proxy Signature Scheme for Mobile Communication -- Hierarchical Simulation Model with Animation for Large Network Security -- Fair Electronic Cash Based on a Group Signature Scheme -- Fair Exchange of Digital Signatures with Offline Trusted Third Party -- SECUSIM: A Tool for the Cyber-Attack Simulation -- A New Semantics of Authentication Logic -- Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles -- Redundancy, Obscurity, Self-Containment & Independence."@en ;
    schema:description "This book constitutes the refereed proceedings of the Third International Conference on Information and Communications Security, ICICS 2001, held in Xian, China in November 2001. The 56 revised full papers presented were carefully reviewed and selected from a total of 134 submissions. The complete spectrum of information and communications security is covered including theoretical foundations, secret sharing, network security, authentication and identification, Boolean functions and stream ciphers, security evaluation, digital signatures, block ciphers and public-key systems, information hiding, security protocols, and cryptanalysis."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/895232546> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/895232546#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/48449699> ;
    schema:name "Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings"@en ;
    schema:productID "166464608" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/166464608#PublicationEvent/berlin_new_york_springer_2001> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/895232546#Agent/springer> ; # Springer
    schema:url <http://link.springer.de/link/service/series/0558/tocs/t2229.htm> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=book&isbn=978-3-540-42880-0> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-42880-0> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/3540456007> ;
    schema:url <http://link.springer.com/10.1007/3-540-45600-7> ;
    schema:url <http://dx.doi.org/10.1007/3-540-45600-7> ;
    schema:workExample <http://dx.doi.org/10.1007/3-540-45600-7> ;
    schema:workExample <http://worldcat.org/isbn/9783540456001> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/166464608> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Meeting/icics_conference_3rd_2001_xian_shaanxi_sheng_china> # ICICS (Conference) (3rd : 2001 : Xian, Shaanxi Sheng, China)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/895232546#Place/xian_shaanxi_sheng_china> ; # Xian, Shaanxi Sheng, China)
    schema:name "ICICS (Conference) (3rd : 2001 : Xian, Shaanxi Sheng, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Place/xian_shaanxi_sheng_china> # Xian, Shaanxi Sheng, China)
    a schema:Place ;
    schema:name "Xian, Shaanxi Sheng, China)" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/166464608> ; # Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/895232546#Topic/telecommunication_systems_security_measures> # Telecommunication systems--Security measures
    a schema:Intangible ;
    rdfs:seeAlso <http://id.loc.gov/authorities/subjects/sh2010115962> ;
    schema:name "Telecommunication systems--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1146074> # Telecommunication systems--Security measures
    a schema:Intangible ;
    schema:name "Telecommunication systems--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/18403173> # Tatsuaki Okamoto
    a schema:Person ;
    schema:familyName "Okamoto" ;
    schema:givenName "Tatsuaki" ;
    schema:name "Tatsuaki Okamoto" ;
    .

<http://viaf.org/viaf/45204193> # Sihan Qing
    a schema:Person ;
    schema:familyName "Qing" ;
    schema:givenName "Sihan" ;
    schema:name "Sihan Qing" ;
    .

<http://viaf.org/viaf/50279185> # Jianying Zhou
    a schema:Person ;
    schema:familyName "Zhou" ;
    schema:givenName "Jianying" ;
    schema:name "Jianying Zhou" ;
    .

<http://worldcat.org/isbn/9783540456001>
    a schema:ProductModel ;
    schema:isbn "3540456007" ;
    schema:isbn "9783540456001" ;
    .

<http://www.worldcat.org/oclc/48449699>
    a schema:CreativeWork ;
    rdfs:label "Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings" ;
    schema:description "Print version:International Conference on Information and Communications Security (3rd : 2001 : Xian, Shaanxi Sheng, China)" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/166464608> ; # Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/166464608>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/166464608> ; # Information and communications security : Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings
    schema:dateModified "2018-01-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.